2,929 results
Search Results
2. Preface — Special Issue: A Collection of Papers in Honour of the 60th Birthday of Victor Mitrana
- Author
-
Csuhaj-Varjú, Erzsébet, primary and Manea, Florin, additional
- Published
- 2020
- Full Text
- View/download PDF
3. An Improved Approximation Algorithm for the Capacitated Correlation Clustering Problem.
- Author
-
Ji, Sai, Cheng, Yukun, Tan, Jingjing, and Zhao, Zhongrui
- Subjects
TELECOMMUNICATION systems ,ALGORITHMS ,GENERALIZATION - Abstract
Correlation clustering problem (CorCP) is a classical clustering problem, which clusters data based on the similarity of data set, and has many applications in interaction networks, cross-lingual link detection, and communication networks, etc. In this paper, we study a practical generalization of the CorCP, called the capacitated correlation clustering problem (the capacitated CorCP), by constructing a labeled complete graph. On this labeled complete graph, each vertex represents a piece of data. If two pieces of data are similar, then the edge between the corresponding vertices is marked by a positive label +. Otherwise, this edge is marked by a negative label -. The objective of the capacitated CorCP is to group some similar data sets into one cluster as far as possible, while satisfying the cluster capacity constraint. To achieve this objective, we shall partition the vertex set of the labeled complete graph into several clusters, each cluster's size subjecting to an upper bound, so as to minimize the number of disagreements. Here the number of disagreements is defined as the total number of the edges with positive labels between clusters and the edges with negative labels within clusters. Different with the previous algorithm in [18], which subjects to the constraint on the cluster size by a penalty measure, we design an algorithm for the capacitated CorCP to directly output a feasible solution by iteratively constructing clusters based on a preset threshold. Through carefully setting the threshold and sophisticatedly analyzing, our algorithm is proved to have an improved approximation ratio of 5.37. In addition, we also conduct a series of numerical experiments to demonstrate the effectiveness of our algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. ERRATA: "The paper: MARTIN-LOF'S TYPE THEORY AS AN OPEN-ENDED FRAMEWORK"
- Author
-
Tsukada, Yasuyuki, primary
- Published
- 2001
- Full Text
- View/download PDF
5. PREFACE: SELECTED PAPERS FROM SIXTH INTERNATIONAL WORKSHOP ON SOLVING IRREGULARLY STRUCTURED PROBLEMS IN PARALLEL (Irregular '99)
- Author
-
ANDRESEN, DANIEL, primary and YANG, TAO, additional
- Published
- 1999
- Full Text
- View/download PDF
6. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE ON SELECTED PAPERS: Fourth Asian Computing Science Conference (Asian98) Manila, Philippines, December 8-10, 1998
- Published
- 1998
- Full Text
- View/download PDF
7. PREFACE: SELECTED PAPERS FROM SIXTH INTERNATIONAL WORKSHOP ON SOLVING IRREGULARLY STRUCTURED PROBLEMS IN PARALLEL (Irregular '99)
- Author
-
Daniel Andresen and Tao Yang
- Subjects
Operations research ,Management science ,Computer science ,Computer Science (miscellaneous) - Published
- 1999
8. ERRATA: 'The paper: MARTIN-LOF'S TYPE THEORY AS AN OPEN-ENDED FRAMEWORK'
- Author
-
Yasuyuki Tsukada
- Subjects
Philosophy ,Computer Science (miscellaneous) ,Mathematical economics - Published
- 2001
9. Vertex-Bipartition: A Unified Approach for Kernelization of Graph Linear Layout Problems Parameterized by Vertex Cover.
- Author
-
Liu, Yunlong, Li, Yixuan, and Huang, Jingui
- Subjects
GRAPH algorithms ,INTEGERS ,ALGORITHMS ,LINEAR orderings - Abstract
The Linear Layout of Graphs problem asks, given a graph G and a positive integer k , whether G admits a layout consisting of a linear ordering of its vertices and a partition of its edges into k sets such that the edges in each set meet some special requirements. Specific linear layouts include k -Stack Layout, k -Queue Layout, k -Arch Layout, Mixed s -Stack q -Queue Layout and others. In this paper, we present a unified approach for kernelization of these linear layout problems parameterized by the vertex cover number τ of the input graph. The key point underlying our approach is to partition each set of related vertices into two distinct subsets with respect to the specific layouts, which immediately leads to some efficient reduction rules. We first apply this approach to the Mixed s -Stack q -Queue Layout problem and show that it admits a kernel of size 2 (τ) , which results in an algorithm running in time (2 2 (τ) + τ ⋅ | V |) , where | V | denotes the size of the input graph. Our work does not only confirm the existence of a fixed-parameter tractable algorithm for this problem mentioned by Bhore et al. (J. Graph Algorithms Appl. 2022), but also derives new results for the k -Stack Layout problem and for the k -Queue Layout problem respectively. We also employ this approach to the Upward k -Stack Layout problem and obtain a new result improving that presented by Bhore et al. (GD 2021). Last but not least, we use this approach to the k -Arch Layout problem and obtain a similar result. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. A Recursive Algorithm for Constructing Dual-CISTs in Hierarchical Folded Cubic Networks.
- Author
-
Lin, Hsin-Jung, Tang, Shyue-Ming, Pai, Kung-Jui, and Chang, Jou-Ming
- Subjects
HYPERCUBES ,TREE graphs ,SPANNING trees ,FAULT tolerance (Engineering) ,ALGORITHMS ,DATA transmission systems - Abstract
Let = { T 1 , T 2 , ... , T k } be a set of k ≥ 2 spanning trees in a graph G. The k spanning trees are called completely independent spanning trees (CISTs for short) if the paths joining every pair of vertices x and y in any two trees have neither vertex nor edge in common except for x and y. Particularly, is called a dual-CIST provided k = 2. For data transmission applications in reliable networks, the existence of a dual-CIST can provide a configuration of fault-tolerant routing called protection routing. This paper investigates the problem of constructing a dual-CIST in the n -dimensional hierarchical folded cubic network H F Q n . The network is a two-level network using folded hypercube F Q n as clusters to reduce the diameter, hardware overhead and improve the fault tolerance ability. We propose a recursive algorithm to construct a dual-CIST of H F Q n in (2 2 n) time for n ≥ 2 , where the time required is the same scale as the number of vertices of H F Q n . Also, the diameter of each constructed CIST is 4 n + 1. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Robust Subgroup Multisignature with One-Time Public Keys in Order.
- Author
-
Wang, Zhiwei, Tian, Chen, Wang, Zhanlin, and Wang, Yuhang
- Subjects
PUBLIC policy (Law) ,EDGE computing ,COMPUTER systems ,BLOCKCHAINS ,POISONS ,PUBLIC key cryptography - Abstract
Robust subgroup multisignature allows any subgroup of signers from a global set to sign a given message on behalf of the whole group, and the individual signatures should be verified before the combination process, which resists poison signature attacks. An emerging application of robust subgroup multisignatures in blockchain is that a qualified subgroup of a global set of users has reached agreement. In the integrated blockchain and edge computing system, the edge server can naturally act as a combiner in multisignatures and help other end devices produce the final aggregate signature. In this paper, we propose a robust subgroup multisignature with one-time public keys in order that has two advantages for solving the signers ordering problem and one-time public key problem simultaneously. Our scheme is a nontrivial extension of Galindo et al.'s robust subgroup multisignature scheme and can be proven unforgeable, robust and chronological in random oracles. Our scheme can also be suitable for the consortium blockchain by adding a noninteractive zero-knowledge (NIZK) proof system for certifying the one-time public keys. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Implementations and Applications of Automata 2018: Preface.
- Author
-
Câmpeanu, Cezar
- Subjects
MACHINE theory ,ROBOTS ,NATURAL language processing - Published
- 2020
- Full Text
- View/download PDF
13. Preface.
- Author
-
Jonoska, Nataša and Savchuk, Dmytro
- Subjects
POLYNOMIAL time algorithms ,SYMBOLIC dynamics ,TRANSDUCERS ,ALGORITHMS - Published
- 2021
- Full Text
- View/download PDF
14. Preface.
- Author
-
Câmpeanu, Cezar and Pighizzini, Giovanni
- Subjects
SOFTWARE reliability ,COMPUTER vision ,FORMAL languages ,BOUND states ,INFORMATION theory - Published
- 2019
- Full Text
- View/download PDF
15. Distributed Independent Sets in Interval and Segment Intersection Graphs.
- Author
-
Bhatt, Nirmala, Gorain, Barun, Mondal, Kaushik, and Pandit, Supantha
- Subjects
- *
INDEPENDENT sets , *INTERSECTION graph theory , *GRAPH theory , *DETERMINISTIC algorithms , *DISTRIBUTED algorithms , *LOCAL mass media , *COMMUNICATION models - Abstract
The Maximum Independent Set problem is well-studied in graph theory and related areas. An independent set of a graph is a subset of non-adjacent vertices of the graph. A maximum independent set is an independent set of maximum size. This paper studies the Maximum Independent Set problem in some classes of geometric intersection graphs in a distributed setting. More precisely, we study the Maximum Independent Set problem on two geometric intersection graphs, interval and axis-parallel segment intersection graphs, and present deterministic distributed algorithms in a model that is similar but a little weaker than the local communication model. We compute the maximum independent set on interval graphs in O(k) rounds and O(n) messages, where k is the size of the maximum independent set and n is the number of nodes in the graph. We provide a matching lower bound of Ω(k) on the number of rounds, whereas Ω(n) is a trivial lower bound on message complexity. Thus, our algorithm is both time and message-optimal. We also study the Maximum Independent Set problem in interval count l graphs, a special case of the interval graphs where the intervals have exactly l different lengths. We propose an 1 2-approximation algorithm that runs in O(l) round. For axis-parallel segment intersection graphs, we design an 1 2-approximation algorithm that obtains a solution in O(D) rounds. The results in this paper extend the results of Molla et al. [J. Parallel Distrib. Comput. 2019]. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Paired Domination Integrity of Graphs.
- Author
-
Antony, Annie Clare and Sangeetha, V.
- Subjects
- *
DOMINATING set , *TELECOMMUNICATION systems , *NETWORK performance - Abstract
The concept of vulnerability in a communication network plays an important role when there is a disruption in the network. There exist several graph parameters that measure the vulnerability of a communication network. Domination integrity is one of the vulnerability parameters that measure the performance of a communication network. In this paper, we introduce the concept of paired domination integrity of a graph as a new measure of graph vulnerability. Let G = (V,E) be a simple, connected graph. A set of vertices in a graph G, say S, is a paired dominating set if the following two conditions are satisfied: (i) every vertex of G has a neighbor in S and (ii) the subgraph induced by S contains a perfect matching. The paired domination integrity of G, denoted by PDI(G), is defined as PDI(G) = min{|S| + m(G − S) : S is a paired dominating set of G}, where m(G − S) is the order of the largest component in the induced subgraph of G − S. In this paper, we determine few bounds relating paired domination integrity with other graph parameters and the paired domination integrity of some classes of graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Approximation Algorithms for Partial Vertex Covers in Trees.
- Author
-
Mkrtchyan, Vahan, Parekh, Ojas, and Subramani, K.
- Subjects
- *
APPROXIMATION algorithms , *TREE graphs , *TREES , *BIPARTITE graphs , *COMPUTATIONAL complexity , *POLYNOMIAL time algorithms - Abstract
This paper is concerned with designing algorithms for and analyzing the computational complexity of the partial vertex cover problem in trees. Graphs (and trees) are frequently used to model risk management in various systems. In particular, Caskurlu et al. in [4] have considered a system which essentially represents a tripartite graph. The goal in this model is to reduce the risk in the system below a predefined risk threshold level. It can be shown that the main goal in this risk management system can be formulated as a Partial Vertex Cover problem on bipartite graphs. In this paper, we focus on a special case of the partial vertex cover problem, when the input graph is a tree. We consider four possible versions of this setting, depending on whether or not, the vertices and edges are weighted. Two of these versions, where edges are assumed to be unweighted, are known to be polynomial-time solvable. However, the computational complexity of this problem with weighted edges, and possibly with weighted vertices, remained open. The main contribution of this paper is to resolve these questions by fully characterizing which variants of partial vertex cover remain NP-hard in trees, and which can be solved in polynomial time. In the paper, we propose two pseudo-polynomial DP-based algorithms for the most general case in which weights are present on both the edges and the vertices of the tree. One of these algorithms leads to a polynomial-time procedure, when weights are confined to the edges of the tree. The insights used in this algorithm are combined with additional scaling ideas to derive an FPTAS for the general case. A secondary contribution of this work is to propose a novel way of using centroid decompositions in trees, which could be useful in other settings as well. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. PREFACE.
- Author
-
YU, SHENG
- Subjects
PREFACES & forewords ,SCIENCE periodicals ,PUBLISHING ,FORMAL languages ,EDITORS ,COMPUTER science - Abstract
No abstract received. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
19. PREFACE.
- Author
-
YEN, HSU-CHUN and IBARRA, OSCAR H.
- Subjects
PREFACES & forewords ,COMPUTER science ,CONFERENCES & conventions ,PROGRAMMING languages ,COMPUTER software development - Published
- 2013
- Full Text
- View/download PDF
20. Special Issue Developments in Language Theory 2018 — Preface.
- Author
-
Seki, Shinnosuke
- Subjects
PHILOSOPHY of language ,TURING machines ,ALGORITHMS ,NONNEGATIVE matrices - Published
- 2020
- Full Text
- View/download PDF
21. Balanced Even-Variable Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity, Maximum Algebraic Degree and Higher Nonlinearity.
- Author
-
Guo, Fei and Wang, Zilong
- Subjects
BOOLEAN functions ,SYMMETRIC functions ,ALGEBRAIC functions ,STREAM ciphers ,ROTATIONAL motion - Abstract
Rotation symmetric Boolean functions are good candidates for stream ciphers because they have such advantages as simple structure, high operational speed and low implement cost. Recently, Mesnager et al. proposed for the first time an efficient method to construct balanced rotation symmetric Boolean functions with optimal algebraic immunity and good nonlinearity for an arbitrary even number of variables. However, the algebraic degree of their constructed n -variable (n > 4) function is always less than the maximum value n − 1. In this paper, by modifying the support of Boolean functions from Mesnager et al.'s construction, we present two new constructions of balanced even-variable rotation symmetric Boolean functions with optimal algebraic immunity as well as higher algebraic degree and nonlinearity. The algebraic degree of Boolean functions in the first construction reaches the maximum value n − 1 if n 2 is odd and n 2 ≠ (2 k + 1) 2 or (2 k + 1) 2 + 2 for integer k , while that of the second construction reaches the maximum value for all n. Moreover, the nonlinearities of Boolean functions in both two constructions are higher than that of Mesnager et al.'s construction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. FOREWORD.
- Author
-
HOLUB, JAN
- Subjects
PREFACES & forewords ,COMPUTER science - Abstract
No abstract received. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
23. Algorithms for Probabilistic and Stochastic Subsequential Failure Transducers.
- Author
-
Geneva, Diana, Shopov, Georgi, and Mihov, Stoyan
- Subjects
AUTOMATIC speech recognition ,NATURAL language processing ,TRANSDUCERS ,SPEECH perception ,ALGORITHMS - Abstract
This paper introduces a framework for building probabilistic models with subsequential failure transducers. We first show how various types of subsequential transducers commonly used in natural language processing are represented by conditional probabilistic subsequential transducers and probabilistic subsequential failure transducers. Afterwards, we introduce efficient algorithms for composition of conditional probabilistic subsequential transducers with probabilistic subsequential failure transducers and canonization (weight-pushing) of probabilistic subsequential failure transducers. Those algorithms are applicable to many tasks for representing probabilistic models. One such task is the construction of the H C L G weighted transducer used in speech recognition which we describe in detail. At the end, a comparison between the presented H C L G failure weighted transducer and the standard H C L G weighted transducer along with empirical results for HMM-based speech recognition decoding reveal the competitiveness of the presented constructions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Enhancing Reliability of Folded Petersen Networks Based on Edge Partition.
- Author
-
Lin, Wanling, Lin, Zhaoding, Zhuang, Hongbin, and Li, Xiao-Yan
- Subjects
- *
PETERSEN graphs , *COMPUTER systems , *FAULT tolerance (Engineering) , *REGULAR graphs , *TOPOLOGY - Abstract
The rapid expansion of infrastructure topology, especially noticeable in high-performance computing systems and data center networks, significantly increases the likelihood of failures in network components. While traditional (edge) connectivity has long been the standard for measuring the reliability of interconnection networks, this approach becomes less effective as networks grow more complex. To address this, two innovative metrics, named matroidal connectivity and conditional matroidal connectivity, have emerged. These metrics provide the flexibility to impose constraints on faulty edges across different dimensions and have shown promise in enhancing the edge fault tolerance of interconnection networks. In this paper, we explore (conditional) matroidal connectivity of the k-dimensional folded Petersen network FPk, which is constructed by iteratively applying the Cartesian product operation on the well-known Petersen graph and possesses a regular, vertex- and edge-symmetric architecture with optimal connectivity and logarithmic diameter. Specifically, the faulty edge set F is partitioned into k subsets according to the dimensions of FPk. We then arrange these subsets by their cardinality, imposing the restriction whereby the cardinality of the ith largest subset dose not exceed 3 ⋅ 10i−1 for 1 ≤ i ≤ k. Subsequently, we show that FPk − F is connected with |F|≤∑i=1k(3 ⋅ 10i−1) and determine the exact value of matroidal connectivity and conditional matroidal connectivity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. The h-Component Diagnosability of Alternating Group Graphs.
- Author
-
Zhuo, Nengjin, Zhang, Shumin, Li, Yalan, and Ye, Chengfu
- Subjects
- *
FAULT diagnosis , *MULTIPROCESSORS - Abstract
With the rapid expansion of multiprocessor systems, the fault diagnosis is becoming more and more important. The h-component diagnosability of a multiprocessor system, is proposed to extend the traditional diagnosability and has been investigated widely. In this paper, we prove that under both the PMC model and MM* model the 2-component and 3-component diagnosability of an n-dimensional alternating group graph are 2n − 5 and 3n − 7 respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Improved Linear-Time Streaming Algorithms for Maximizing Monotone Cardinality-Constrained Set Functions.
- Author
-
Cui, Min, Du, Donglei, Gai, Ling, and Yang, Ruiqi
- Subjects
- *
DETERMINISTIC algorithms , *SET functions , *APPROXIMATION algorithms , *SOCIAL networks , *ALGORITHMS - Abstract
Many real-world applications arising from social networks, personalized recommendations, and others, require extracting a relatively small but broadly representative portion of massive data sets. Such problems can often be formulated as maximizing a monotone set function with cardinality constraints. In this paper, we consider a streaming model where elements arrive quickly over time, and create an effective, and low-memory algorithm. First, we provide the first single-pass linear-time algorithm, which is a a deterministic algorithm, achieves an approximation ratio of [ γ 4 a (1 + γ + γ 2 + γ 3) − ] for any ≥ 0 with a query complexity of ⌈ n / a ⌉ + a and a memory complexity of O (a k log (k) log (1 /)) , where a is a positive integer and γ is the submodularity ratio. However, the algorithm may produce less-than-ideal results. Our next result is to describe a multi-streaming algorithm, which is the first deterministic algorithm to attain an approximation ratio of 1 − e − γ − with linear query complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Hardness Results of Connected Power Domination for Bipartite Graphs and Chordal Graphs.
- Author
-
Goyal, Pooja and Panda, B. S.
- Subjects
- *
POLYNOMIAL time algorithms , *DOMINATING set , *GRAPH algorithms , *HARDNESS , *BIPARTITE graphs , *NEIGHBORS - Abstract
A set D ⊆ V of a graph G = (V , E) is called a connected power dominating set of G if G [ D ] , the subgraph induced by D , is connected and every vertex in the graph can be observed from D , following the two observation rules for power system monitoring: Rule 1 : if v ∈ D , then v can observe itself and all its neighbors, and Rule 2 : for an already observed vertex whose all neighbors except one are observed, then the only unobserved neighbor becomes observed as well. Given a graph G , Minimum Connected Power Domination is to find a connected power dominating set of minimum cardinality of G and Decide Connected Power Domination is the decision version of Minimum Connected Power Domination. Decide Connected Power Domination is known to be N P -complete for general graphs. In this paper, we prove that Decide Connected Power Domination remains N P -complete for star-convex bipartite graphs, perfect elimination bipartite graphs and split graphs. This answers some open problems posed in [B. Brimkov, D. Mikesell and L. Smith, Connected power domination in graphs, J. Comb. Optim. 38(1) (2019) 292–315]. On the positive side, we show that Minimum Connected Power Domination is polynomial-time solvable for chain graphs, a proper subclass of perfect elimination bipartite graph, and for threshold graphs, a proper subclass of split graphs. Further, we show that Minimum Connected Power Domination cannot be approximated within (1 −) ln | V | for any > 0 unless P = N P , for bipartite graphs as well as for chordal graphs. Finally, we show that Minimum Connected Power Domination is APX -hard for bounded degree graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Parameterized Complexity Classes Defined by Threshold Circuits and Their Connection with Sorting Networks.
- Author
-
Paranhos, Raffael Muralha, Silva, Janio Carlos Nascimento, and Souza, Uéverton dos Santos
- Subjects
- *
LOGIC circuits , *CIRCUIT complexity , *TIME complexity , *ELECTRIC circuit networks , *GENERALIZATION - Abstract
The main complexity classes of the Parameterized Intractability Theory are based on weighted Boolean circuit satisfiability problems and organized into a hierarchy so-called W-hierarchy. The W-hierarchy enables fine-grained complexity analyses of parameterized problems that are unlikely to belong to the FPT class. In this paper, we introduce the Th-hierarchy, a natural generalization of the W-hierarchy defined by unweighted threshold circuit satisfiability problems. Investigating the relationship between Th-hierarchy and W-hierarchy, we discuss the complexity of transforming Threshold circuits into Boolean circuits, and observe that sorting networks are powerful tools to handle such transformations. First, we show that these hierarchies collapse at the last level (W[P] = Th[P]). After that, we present a time complexity analysis of an AKS sorting network construction, which supports some of our results. Finally, we prove that Th[ t ] ⊆ W[SAT] for every t ∈ ℕ. As a by-product, our studies suggest that it is relevant to consider a new class based on logarithmic depth circuits in the W-hierarchy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Conditional Fractional Matching Preclusion Number of Graphs.
- Author
-
Li, Wen, Liu, Yuhu, Li, Yinkui, Cheng, Eddie, and Mao, Yaping
- Subjects
- *
COMPLETE graphs , *NUMBER theory , *CUBES , *BIPARTITE graphs - Abstract
The
conditional fractional matching preclusion number (CFMP number for short) fmp1(G) of a graph G is the minimum number of edges whose deletion results in a graph without isolated vertices and without fractional perfect matchings. In this paper, we study the CFMP number of complete graphs, complete bipartite graphs and twisted cubes. Also, we give Nordhaus–Gaddum-type results for the CFMP numbers of general graphs. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
30. On the Super (Edge)-Connectivity of Generalized Johnson Graphs.
- Author
-
Yu, Zhecheng, Xu, Liqiong, Wu, Xuemin, and Zheng, Chuanye
- Subjects
- *
RAMSEY theory , *COMBINATORIAL geometry , *CODING theory , *GRAPH connectivity , *HYPERGRAPHS , *INTEGERS - Abstract
Let n , k and t be non-negative integers. The generalized Johnson graph G (n , k , t) is the graph whose vertices are the k -subsets of the set { 1 , 2 , ... , n } , and two vertices are adjacent if and only if they intersect with t elements. Special cases of generalized Johnson graph include the Kneser graph G (n , k , 0) and the Johnson graph G (n , k , k − 1). These graphs play an important role in coding theory, Ramsey theory, combinatorial geometry and hypergraphs theory. In this paper, we discuss the connectivity properties of the Kneser graph G (n , k , 0) and G (n , k , 1) by their symmetric properties. Specifically, with the help of some properties of vertex/edge-transitive graphs we prove that G (n , k , 0) (5 ≤ 2 k + 1 ≤ n) and G (n , k , 1) (4 ≤ 2 k ≤ n) are super restricted edge-connected. Besides, we obtain the exact value of the restricted edge-connectivity and the cyclic edge-connectivity of the Kneser graph G (n , k , 0) (5 ≤ 2 k + 1 ≤ n) and G (n , k , 1) (4 ≤ 2 k ≤ n) , and further show that the Kneser graph G (n , k , 0) (5 ≤ 2 k + 1 ≤ n) is super vertex-connected and super cyclically edge-connected. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. On Two Modifications of the McEliece PKE and the CFS Signature Scheme.
- Author
-
D'Alconzo, Giuseppe
- Subjects
- *
DIGITAL signatures , *PUBLIC key cryptography , *ALGORITHMS - Abstract
This paper analyzes two schemes from a 2019 work by Liu, Yang, Han and Wang, namely, adapting the McEliece cryptosystem to obtain a new public-key encryption scheme, and designing an efficient CFS-like digital signature. It is shown that the new encryption scheme based on McEliece, even if it has longer public keys, is not more secure than the standard one. The security gap between the original scheme and its modification is presented. Moreover, while the proposed parameters for the digital signature scheme lead to a significant performance improvement, however, they introduce a vulnerability in the protocol. A key-forgery attack using the Support Splitting Algorithm as a subroutine is described, with a study of the computational cost of retrieving the secret key from the public one. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Parameterized Algorithms for Fixed-Order Book Drawing with Few Crossings Per Edge.
- Author
-
Huang, Jingui, Chen, Jie, Liu, Yunlong, Xiao, Guang, and Wang, Jianxin
- Subjects
- *
GRAPH algorithms , *ALGORITHMS , *OPEN-ended questions - Abstract
Given an n -vertex graph G with a fixed linear ordering of V (G) and two integers k , b , the problem FIXED-ORDER BOOK DRAWING with few crossings per edge asks whether or not G admits a k -page book drawing where the maximum number of crossings per edge can be upper bounded by the number b. This problem was posed as an open question by Bhore et al. (J. Graph Algorithms Appl. 2020). In this paper, we study this problem from the viewpoint of parameterized complexity, in particular, we develop fixed-parameter tractable algorithms for it. More specifically, we show that this problem parameterized by both the bound number b of crossings per edge and the vertex cover number τ of the input graph admits an algorithm with running time in (b + 2) (τ 3) ⋅ n , and this problem parameterized by both the bound number b of crossings per edge and the pathwidth κ of the vertex ordering admits an algorithm with running time in (b + 2) (κ 2) ⋅ n. Our results provide a specific answer to Bhore et al.'s question. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Research on Prediction of Housing Prices Based on GA-PSO-BP Neural Network Model: Evidence from Chongqing, China.
- Author
-
Sun, Ziyi and Zhang, Jing
- Subjects
HOME prices ,ARTIFICIAL neural networks ,REAL estate business ,GENETIC algorithms ,PRICES - Abstract
Since 2000, the real estate industry has experienced rapid development, and at the same time, it has driven the rapid growth of housing prices, and the trend of housing prices has attracted attention. This paper integrates genetic algorithm and particle swarm algorithm to optimize BP neural network, and establishes a housing price prediction model based on mixed genetic particle swarm BP neural network. The average data of housing prices in Chongqing, China from 2000 to 2020 and several main factors affecting the trend of housing prices were selected as experimental data. Through the training and simulation prediction based on the mixed particle swarm BP neural network, the error between the predicted value and the actual value was within 0.5%, the validity and accuracy of the model are proved. At the same time, this paper predicts the average price of residential commercial housing in Chongqing in 2021, which provides a reference for the government's macro-control and sellers to carry out residential commercial housing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. Fuzzy Dynamic Obstacle Avoidance Algorithm for Basketball Robot Based on Multi-Sensor Data Fusion Technology.
- Author
-
Shi, Feng and Hu, Xiaomei
- Subjects
MULTISENSOR data fusion ,MOBILE robots ,BASKETBALL ,ROBOT motion ,ROBOTS ,ALGORITHMS ,NANOPOSITIONING systems - Abstract
This paper uses multi-sensor data fusion technology to design and develop a multi-sensor based basketball robot's target recognition and positioning system in an unknown environment. We establish the movement model of the basketball robot, and combine the hardware configuration of the basketball robot, analyse the methods of speed control, position control, and direction control, propose a fuzzy obstacle avoidance strategy in the basketball robot movement process, and simulate the obstacle avoidance strategy. The simulation results show that the proposed fuzzy obstacle avoidance strategy is effective. Carry out the experiment of basketball robot target calibration, build the basketball robot monitoring system, and realize data transmission and real-time image processing. Experiments show that the basketball robot can achieve target recognition and positioning tasks in an unknown environment (obstacle comparison rules). It proves the effectiveness and robustness of the proposed following algorithm. It illustrates the effectiveness of the system designed in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
35. Fuzzy Clustering-Based Financial Data Mining System Analysis and Design.
- Author
-
Li, Kun and Chen, Yanjun
- Subjects
FUZZY clustering technique ,DATA mining ,SYSTEM analysis ,CORPORATE finance ,FUZZY algorithms ,PROBLEM solving - Abstract
This paper is based on fuzzy clustering algorithm on financial data, design of financial data mining system and analysis of financial data, analysis of financial data on the financial decision-making mechanism, from financial data how to enhance the information base of the forecast, financial data how to improve the pertinence of decision-making, financial data how to build a new competitive advantage, financial data how to promote the dynamic decision-making of four, through the analysis of data in financial decision-making specific implementation cases, focusing on the real-life problems faced by the management and the effect of financial data platform to solve problems; finally, through this paper, we hope to provide reference and reference for other similar enterprises to apply financial data for financial decision-making. This paper first describes the theory of financial data, analyzes the mechanism of financial data and financial decision-making, how financial data enhance the information base of forecasting, how financial data improve the pertinence of decision-making, how financial data build a new competitive advantage, how financial data promote dynamic decision-making four dimensions to summarize. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
36. PREFACE.
- Author
-
MAUR, GIANCARLO and LEPORATI, ALBERTO
- Subjects
PREFACES & forewords ,PERIODICAL editors ,COMPUTER science periodicals ,LANGUAGE & languages ,PUBLISHING ,PERIODICAL articles - Published
- 2012
- Full Text
- View/download PDF
37. Modelling Uncertainty in Architectures of Parametric Component-Based Systems.
- Author
-
Pittou, Maria and Rahonis, George
- Subjects
MODULES (Algebra) ,PROPOSITION (Logic) ,FUZZY neural networks ,TRUST ,SATISFIABILITY (Computer science) - Abstract
In this paper, we propose a logic-based characterization of uncertainty in architectures of parametric component-based systems, where the parameter is the number of instances of each component type. For this, we firstly introduce an extended propositional interaction logic over De Morgan algebras and we show that its formulas can encode the uncertainty of several architectures applied in systems with a finite number of components. In turn, we introduce a first-order extended interaction logic over De Morgan algebras which is applied for modelling uncertainty in the interactions of well-known parametric architectures. Moreover, we prove that the equivalence problem for a large class of formulas of that logic is decidable in doubly exponential time by providing an effective translation to fuzzy recognizable series. For any such formula over a totally ordered De Morgan algebra, we further prove that we can compute in exponential time the set of sequences of parametric fuzzy interactions which ensure the trustworthiness of the formula according to a particular threshold. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Transportation Problem Allowing Sending and Bringing Back.
- Author
-
Asano, Tetsuo
- Subjects
- *
NP-complete problems , *WEIGHTED graphs , *LINEAR programming , *DYNAMIC programming - Abstract
This paper considers a transportation problem on a weighted graph. The weights specify the amounts of commodities at nodes, which are positive if the amounts are stored at nodes and negative if the amounts are needed at nodes. To meet all demands we use vehicles, one at each node, with some loading capacity to and from neighbors. In a trip using a vehicle we can send commodities from a node to a neighbor along an edge and also bring back some other commodities from the neighbor. In this paper we are interested in feasibility problem, which is to decide whether there is a single round of trips that meet all demands. We prove the feasibility problem is NP-complete even in the easiest case of a one-commodity transportation problem with unbounded capacity. We also present several different polynomial-time algorithms for other cases. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. AUTOMATA AND FORMAL LANGUAGES (AFL 2011).
- Author
-
DÖMÖSI, PÀL and ÉSIK, ZOLTÀN
- Subjects
COMPUTER science ,INFORMATION technology ,COMPUTER programmers ,INFORMATION science ,COMPUTER programming ,PROGRAMMING languages - Published
- 2012
- Full Text
- View/download PDF
40. PREFACE.
- Author
-
MONTANARI, ANGELO, NAPOLI, MARGHERITA, and PARENTE, MIMMO
- Subjects
MACHINE theory ,MATHEMATICAL logic ,GAME theory ,GRAPH theory ,MATHEMATICAL models ,COMPUTER algorithms - Abstract
No abstract received. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
41. PREFACE.
- Author
-
ALBA, ENRIQUE, SEREDYNSKI, FRANCISZEK, TALBI, EL-GHAZALI, and ZOMAYA, ALBERT Y.
- Subjects
PUBLISHING ,SPECIAL issues of periodicals ,DISTRIBUTED computing ,COMPUTER science periodicals ,BIONICS ,COMMUNICATION & technology - Abstract
No abstract received. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
42. SPECIAL ISSUE 9TH INTERNATIONAL CONFERENCE ON IMPLEMENTATION AND APPLICATION OF AUTOMATA (CIAA 2004).
- Author
-
Salomaa, Kai and Yu, Sheng
- Subjects
PERIODICALS ,COMPUTER science - Abstract
Presents an introduction to several articles published in the June 2005 issue of the "International Journal of Foundations of Computer Science."
- Published
- 2005
43. Regular Expressions Avoiding Absorbing Patterns and the Significance of Uniform Distribution.
- Author
-
Broda, Sabine, Machiavelo, António, Moreira, Nelma, and Reis, Rogério
- Subjects
- *
ROBOTS , *COMBINATORICS , *GRAMMAR , *ALGORITHMS , *DENSITY - Abstract
Although regular expressions do not correspond univocally to regular languages, it is still worthwhile to study their properties and algorithms. For the average case analysis one often relies on the uniform random generation using a specific grammar for regular expressions, that can represent regular languages with more or less redundancy. Generators that are uniform on the set of expressions are not necessarily uniform on the set of regular languages. Nevertheless, it is not straightforward that asymptotic estimates obtained by considering the whole set of regular expressions are different from those obtained using a more refined set that avoids some large class of equivalent expressions. In this paper we study a set of expressions that avoid a given absorbing pattern. It is shown that, although this set is significantly smaller than the standard one, the asymptotic average estimates for the size of the Glushkov automaton for these expressions does not differ from the standard case. Furthermore, for this set the asymptotic density of 휀-accepting expressions is also the same as for the set of all standard regular expressions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. The 4-Set Tree Connectivity of Folded Hypercube.
- Author
-
Wang, Junzhen, Zhang, Shumin, and Zhu, Bo
- Subjects
- *
HYPERCUBES , *GRAPH connectivity , *TREES - Abstract
The k-set tree connectivity, as a natural extension of classical connectivity, is a very important index to evaluate the fault-tolerance of interconnection networks. Let G = (V,E) be a connected graph and a subset S ⊆ V, an S-tree of graph G is a tree T = (V′,E′) that contains all the vertices of S and E(T) ⊆ E(G). Two S-trees T and T′ are internally disjoint if and only if E(T) ∩ E(T′) = ∅ and V (T) ∩ V (T′) = S. The cardinality of maximum internally disjoint S-trees is defined as κG(S), and the k-set tree connectivity is defined by κk(G) =min{κG(S)|S ⊆ V (G) and |S| = k}. In this paper, we show that the k-set tree connectivity of folded hypercube when k = 4, that is, κ4(FQn) = n, where FQn is folded hypercube for n ≥ 2. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. The Longest Wave Subsequence Problem: Generalizations of the Longest Increasing Subsequence Problem.
- Author
-
Chen, Guan-Zhi, Yang, Chang-Biau, and Chang, Yu-Cheng
- Subjects
- *
TIME complexity , *GENERALIZATION , *PROBLEM solving - Abstract
The
longest increasing subsequence (LIS) problem aims to find the subsequence exhibiting an increasing trend in a numeric sequence with the maximum length. In this paper, we generalize the LIS problem to thelongest wave subsequence (LWS) problem, which encompasses two versions: LWSt and LWSr. Given a numeric sequence A of distinct values and a target trend sequence T, the LWSt problem aims to identify the longest subsequence of A that preserves the trend of the prefix of T. And, the LWSr problem aims to find the longest subsequence of A within r segments, alternating increasing and decreasing subsequences. We propose two efficient algorithms for solving the two versions of the LWS problem. For the LWSt problem, the time complexity of our algorithm is O(nlog n), where n represents the length of the given numeric sequence A. Additionally, we propose an O(rnlog n)-time algorithm for solving the LWSr problem. In both algorithms, we utilize the priority queues for the insertion, deletion, and successor operations. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
46. State Complexity of Boolean Operations on Graph-Walking Automata.
- Author
-
Martynova, Olga and Okhotin, Alexander
- Subjects
- *
FINITE state machines , *GRAPH labelings - Abstract
Finite automata that traverse graphs by moving along their edges are known as graph-walking automata (GWA). This paper investigates the state complexity of Boolean operations for this model. It is proved that the union of GWA with m and n states, with m ≤ n, operating on graphs with k labels of edge end-points, is representable by a GWA with 2km + n + 1 states, and at least 2(k − 3)(m − 1) + n − 1 states are necessary in the worst case. For the intersection, the upper bound is (2k + 1)m + n and the lower bound is 2(k − 3)(m − 1) + n − 1. The upper bound for the complementation is 2kn + 1, and the lower bound is 2(k − 3)(n − 1). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. An Efficient Algorithm to Compute Dot Product Dimension of Some Outerplanar Graphs.
- Author
-
Bahrami, Mahin, Kiani, Dariush, and Rahmati, Zahed
- Subjects
- *
ALGORITHMS - Abstract
A graph G = (V (G),E(G)) is called a k-dot product graph if there is a function f : V (G)→ℝk such that for any two distinct vertices u and v, f(u).f(v) ≥ 1 if and only if uv ∈ E(G). The minimum value k such that G is a k-dot product graph, is called the dot product dimension ρ(G) of G. In this paper, we give an efficient algorithm for computing the dot product dimension of outerplanar graphs of at most two edge-disjoint cycles. If the graph has two cycles, we only consider those outerplanar graphs if both cycles have exactly one vertex in common and the length of one of the cycles is greater than or equal to six. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. An Improvement for Error-Correcting Pairs of Some Special MDS Codes.
- Author
-
Xiao, Rui and Liao, Qunying
- Subjects
- *
ERROR-correcting codes , *REED-Solomon codes , *LINEAR codes - Abstract
The error-correcting pair is a general algebraic decoding method for linear codes. Since every linear code is contained in an MDS linear code with the same minimum distance over some finite field extensions, we focus on MDS linear codes. Recently, He and Liao showed that for an MDS linear code 풞 with minimum distance 2ℓ + 2, if it has an ℓ-error-correcting pair, then the parameters of the pair have three possibilities. Moreover, for the first case, they gave a necessary condition for an MDS linear code 풞 with minimum distance 2ℓ + 2 to have an ℓ-error-correcting pair, and for the other two cases, they only gave some counterexamples. For the second case, in this paper, we give a necessary condition for an MDS linear code 풞 with minimum distance 2ℓ + 2 to have an ℓ-error-correcting pair, and then basing on the Product Singleton Bound, we prove that there are two cases for such pairs, and then give some counterexamples basing on twisted generalized Reed–Solomon codes for these cases. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Some Special Perfect c-Nonlinear Functions on ℤn.
- Author
-
Wang, Yan-Ping and Zhang, Wei-Guo
- Subjects
- *
RINGS of integers , *POLYNOMIAL rings , *TENSE (Grammar) , *RESEARCH personnel , *UNIFORMITY , *CRYPTOGRAPHY - Abstract
The notion of c-differential uniformity was proposed by Ellingsen
et al. , which generalizes the classical differential uniformity measuring the resistance against differential cryptanalysis. Since then, the research of functions with low c-differential uniformity over finite fields attracted many researchers’ attention. However, it seems that there is no study of function with low c-differential uniformity over integer rings modulo n. In this paper, we give an extension of the c-differential uniformity concept to rings of integers module some n > 0, and we present several perfect c-nonlinear polynomial functions on the integer ring ℤn for the different integer n. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
50. Linear Complexity of r-Ary Sequences Derived from Euler Quotient Modulo pq.
- Author
-
Xiao, Zibi, Li, Zepeng, Yang, Bo, and Fan, Jinmei
- Subjects
- *
SHIFT registers , *POLYNOMIALS , *EULER polynomials - Abstract
In this paper, we present a generic construction of r-ary sequences with period pq2 based on the Euler quotient modulo pq, where p and q are odd primes satisfying that p divides q − 1 and r is any prime less than q. The minimal polynomial and the linear complexity of the proposed sequences are determined in most cases under the assumption that rq−1≢1 (mod q2). The result shows that each of the sequences has large linear complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.